Archive for June 2012 | Monthly archive page
Comments Off on PHP 5.4
Improvements to single inheritance for classes.2) Array Improvements
Array manipulation has improved by introduction of array de-referencing. This removes the need to define temporary variables. Code looks neater. Now you can do:$food = explode(",", "pizzahut,burgerking,kfc,mcdonalds"); $food; // mcdonalds echo explode(",", "pizzahut,burgerking,kfc,mcdonalds"); //mcdonalds 3) $this support in Closures 4) Build-in CLI Web Server
A command line web-server is included in the php interpreter. This is invoked by: $ cd ~/public_html $ php –S localhost:8000 5) <?= support
The short_open_tag setting in php.ini allows for the use of <?= by default in PHP 5.4. Code looks neater. Example:
Previously we used: <?php echo $variable ?>
Now we can use: <?= $variable ?>
The Open Web Application Security Project (OWASP) has opened a chapter in Canberra. Kicked off by Andrew Muller of Ionize, OWASP brings to Canberra expertise in web application security. It also brings the small community of security professionals to meet, discuss and engage in the crucial business of securing applications.
OWASP Canberra is committed to monthly meetings, and the occasional “special” meeting. See you there!
OWASP has a project called ‘The OWASP top ten project‘ which list the top 10 security threats for web-based applications.
OWASP Current Top Twelve ThreatsCross-Site Scripting (XSS) Malicious File execution Insecure Direct Object References Cross-site Request Forgery (spoofing) Information Leakage and Improper Error Handling (I’m guilty) Injections Flaws Broken authentication and session management Insecure cryptographic storage Transport Layer Protection (TLP) Failure to secure URL access (I’m guilty) Security Misconfiguration Unvalidated Redirects and Forwards
Ok, which ones are you guilty of?